Wired's new Guide to Digital Security is an excellent addition to the genre of simple-to-follow how-tos for reducing the likelihood that you'll be victimized by computer-assisted crime and harassment, and that if you are, the harms will be mitigated.
Like Motherboard's guide, it is formatted as a series of short articles; like EFF's Surveillance Self Defense kit, it is structured around different kinds of threats, with separate paths for "civilians," "public figures" and "spies."
Some of the standout articles:
* Smartphone Security 101: The Steps That Matter Most in which Lily Hay Newman offers "quick and easy steps to make big improvements to your mobile security";
* How to Encrypt All of the Things, where Andy Greenberg shows you "how to keep snoopers out of every facet of your digital life, whether it's video chat or your PC's hard drive";
* How to Sweep For Bugs and Hidden Cameras, where Lily Hay Newman basically shows that unless you're really technologically sophisticated, this is very, very hard;
* and What to Do if You’re Being Doxed, where Newman interviews the Electronic Frontier Foundation's Eva Galperin for really practical advice on what could easily be a nightmare scenario.
Electronic security is a team sport: that's why the Cybersecurity Campaign Playbook has a chapter for how family members of political campaigners should armor themselves against being used as a means to get at their relatives.
This is the ideal season for you to help you up your family's security game. When you go home for the holidays, think about how you can install software, change defaults, and teach your family good practices to help you -- and them -- stay safe.
If this interests you, read EFF's Security Education Companion, which teaches you how to be an effective communicator of security precepts.
The WIRED Guide to Digital Security
A child reportedly rode through an X-ray baggage scanner last week at the Xiaolan Railway Station in South China. According to the state-owned China Global Television Network, the young’n snuck away from his father and hopped onto the conveyor belt. Apparently he is fine. As you’ll recall, earlier this year a woman in Dongguan, China […]
When security researchers report on the ghastly defects in voting machines, the officials who bought these machines say dismiss their concerns by saying that the tamper-evident seals they put around the machines prevent bad guys from gaining access to their internals.
Medtronic (previously) is a notoriously insecure medical implant manufacturer whose devices have been repeatedly shown to be grossly insecure -- their pacemakers can be hacked before leaving the factory!
Speed reading isn’t just an innate skill possessed by a lucky few. Anyone can learn to speed read, and the benefits are endless. The brain can process more information than most people have time to soak up, but you can make that time now with the 2018 Award-Winning Speed Reading Bundle. The first half of […]
Sure, you could use the same old PowerPoint templates for your next business presentation. It’s not like you have bosses or investors to impress. Oh wait, you do? Time to augment that slideshow with Slideshop – the presentation tool that can individualize your pitch while saving you time. Compatible with PowerPoint, Keynote and Google Slides, […]
Multinational companies have used the no-nonsense methodologies of Six Sigma and Lean Six Sigma to oil a smooth-running operation for years. What is it? Six Sigma (and its offshoot, Lean Six Sigma) apply the principles of science to business, teaching managers to methodically target waste, maximize output and streamline the flow from producer to consumer. […]